Professional Documents
Culture Documents
Ebook Technology in Action Complete Global Edition Alan Evans Online PDF All Chapter
Ebook Technology in Action Complete Global Edition Alan Evans Online PDF All Chapter
https://ebookmeta.com/product/technology-in-action-
complete-16-global-edition-mary-anne-poatsy/
https://ebookmeta.com/product/technology-in-action-complete-16th-
edition-kendall-e-martin/
https://ebookmeta.com/product/business-analytics-global-edition-
james-evans/
https://ebookmeta.com/product/business-in-action-tenth-global-
edition-courtland-l-bovee/
A Simple Guide to Technology and Analytics Brian J.
Evans
https://ebookmeta.com/product/a-simple-guide-to-technology-and-
analytics-brian-j-evans/
https://ebookmeta.com/product/digital-technology-in-physical-
education-global-perspectives-jeroen-koekoek/
https://ebookmeta.com/product/technology-and-public-
management-2nd-edition-alan-r-shark/
https://ebookmeta.com/product/coding-the-arduino-building-fun-
programs-games-and-electronic-projects-technology-in-action-
dukish/
https://ebookmeta.com/product/the-heaviest-metals-science-and-
technology-of-the-actinides-and-beyond-1st-edition-william-j-
evans-timothy-p-hanusa-william-j-evans/
This is a special edition of an established title widely used by colleges and
GLOBAL universities throughout the world. Pearson published this exclusive edition
for the benefit of students outside the United States and Canada. If you
GLOBAL
EDITION purchased this book within the United States or Canada, you should be aware EDITION
EDITION
GLOB AL
that it has been imported without the approval of the Publisher or Author.
Technology in Action
Technology in Action
Instead of a history lesson on the microchip, we focus on tasks students can
accomplish with their computing devices and skills they can apply immediately
Complete
in the workplace, in the classroom, and at home.
—Alan Evans, Kendall Martin, and Mary Anne Poatsy
Complete
Now in its sixteenth edition, the best-selling Technology in Action continues to keep
up with the ever-increasing pace of technological change around the world, exploring
the newest gadgets, innovations, and technology trends. While today’s students
SIXTEENTH EDITION
are more comfortable with digital environments than previous generations, their
knowledge of the machines they use every day may still be limited. Drawing on their
vast experience teaching computer concepts, the authors bridge this gap by both Alan Evans • Kendall Martin • Mary Anne Poatsy
teaching the fundamentals and providing hands-on training through practical content,
Web projects, and interactive simulation activities.
Key Features
• NEW—What Do You Think? surveys at the beginning of each chapter encourage
readers to think critically, while follow-up What Do You Think Now? questions at
SIXTEENTH
EDITION
the end reinforce the concepts.
• NEW—Chew on This questions urge readers to think about the impact of
technology on society.
• Make This exercises let readers explore mobile app development in both the
Android and iOS environments through hands-on activities.
• Solve This exercises reinforce concepts and integrate them with Microsoft Office
skills.
Available separately for purchase is MyLab IT, the teaching and learning platform that
empowers instructors to reach out to every student and, combined with our trusted
content, delivers the learning outcomes that students and instructors aspire to.
You will find the Helpdesks, Sound Bytes, and IT Simulations in MyLab IT.
Technology
in Action
Complete
Chapter 1
The Impact of Technology in a Changing World ....................................................................... 30
Chapter 2
Looking at Computers: Understanding the Parts ..................................................................... 64
Chapter 3
Using the Internet: Making the Most of the Web’s Resources ................................................ 108
Chapter 4
Application Software: Programs That Let You Work and Play ................................................. 148
Chapter 5
System Software: The Operating System, Utility Programs, and File Management ................. 186
Chapter 6
Understanding and Assessing Hardware: Evaluating Your System ......................................... 226
Chapter 7
Networking: Connecting Computing Devices ......................................................................... 268
Chapter 8
Managing Your Digital Lifestyle: Challenges and Ethics .......................................................... 300
Chapter 9
Securing Your System: Protecting Your Digital Data and Devices ........................................... 350
Chapter 10
Behind the Scenes: Software Programming ........................................................................... 396
Chapter 11
Behind the Scenes: Databases and Information Systems ...................................................... 440
Chapter 12
Behind the Scenes: Networking and Security in the Business World ...................................... 484
Chapter 13
Behind the Scenes: How the Internet Works .......................................................................... 526
Appendix A
The History of the Personal Computer ................................................................................... 564
Appendix B
Careers in IT .......................................................................................................................... 576
Glossary................................................................................................................................. 590
Index...................................................................................................................................... 608
3
Contents
Chapter 1
The Impact of Technology in a Changing World .................................................... 30
Part 1: Technology in Society .............................................................................................................................................. 32
Learning Outcome 1.1 You will be able to discuss the impact of the tools of modern technology on national
and global issues.
Technology in a Global Society ........................................................................................................................... 32
Impact of Tools of Modern Technology ................................................................................................................ 32
Objective 1.1 Describe various technological tools being used to impact national and global issues.
Global Issues ....................................................................................................................................................... 33
Objective 1.2 Describe various global social issues that are being affected by technology.
Technology Connects Us with Others ................................................................................................................ 34
Technology Impacts How and Why We Connect and Collaborate ........................................................................ 34
Objective 1.3 Describe how technology is changing how and why we connect and collaborate with others.
Technology Impacts How We Consume .............................................................................................................. 35
Objective 1.4 Summarize how technology has impacted the way we choose and consume products and services.
The Importance of Computer Literacy ............................................................................................................... 36
Computer Literacy ............................................................................................................................................... 36
Objective 1.5 Characterize computer literacy and explain why it is important to be computer literate.
HELPDESK: Technology Impacts ........................................................................................................................................... 36
SOUND BYTE: Virtual Computer Tour .................................................................................................................................... 37
TRY THIS: What Does Facebook Know about You? ........................................................................................... 39
MAKE THIS: TOOL: IFTTT.com (If This Then That) .............................................................................................. 40
Part 2: Emerging Technologies and Ethical Computing .................................................................................................... 41
Learning Outcome 1.2 You will be able to describe emerging technologies, such as artificial intelligence, and how
technology creates new ethical debates.
Artificial Intelligence ............................................................................................................................................. 41
Artificial Intelligence Basics .................................................................................................................................. 41
Objective 1.6 Describe artificial intelligence systems and explain their main goals.
HELPDESK: The Impact of Artificial Intelligence ...................................................................................................................... 41
ETHICS IN IT: Ethics in Computing .................................................................................................................... 44
Working with Artificial Intelligence and Other Information Technologies ....................................................... 45
Technology and Your Career ................................................................................................................................ 45
Objective 1.7 Describe how artificial intelligence and other emerging technologies are important in many careers.
BITS&BYTES: Is It AI or Human? Take a Turing Test! .......................................................................................... 47
DIG DEEPER: XR Extended Reality .................................................................................................................... 49
Ethical Computing ................................................................................................................................................ 50
Defining Ethics ..................................................................................................................................................... 50
Objective 1.8 Define ethics and examine various ethical systems.
SOUND BYTE: How to Debate Ethical Issues ......................................................................................................................... 50
Personal Ethics .................................................................................................................................................... 51
Objective 1.9 Describe influences on the development of your personal ethics.
Ethics and Technology ......................................................................................................................................... 53
Objective 1.10 Present examples of how technology creates ethical challenges.
SOLVE THIS: How Technology Is Used on the World Stage and in Your Personal Life ......................................... 63
4 Contents
Chapter 2
Looking at Computers: Understanding the Parts ................................................... 64
Part 1: Understanding Digital Components ....................................................................................................................... 66
Learning Outcome 2.1 You will be able to describe the devices that make up a computer system.
Understanding Your Computer ........................................................................................................................... 66
Computers Are Data Processing Devices ............................................................................................................ 66
Objective 2.1 Describe the four main functions of a computer system and how they interact with data and information.
Binary: The Language of Computers ................................................................................................................... 67
Objective 2.2 Define bits and bytes, and describe how they are measured, used, and processed.
SOUND BYTE: Binary Numbers Interactive ............................................................................................................................ 67
Types of Computers ............................................................................................................................................ 69
Objective 2.3 List common types of computers, and discuss their main features.
ACTIVE HELPDESK: Understanding Bits and Bytes .............................................................................................................. 69
BITS&BYTES: Today’s Supercomputers: Faster Than Ever ................................................................................. 73
Input Devices ........................................................................................................................................................ 73
Physical Keyboards and Touch Screens .............................................................................................................. 73
Objective 2.4 Identify the main types of keyboards and touch screens.
Mice and Other Pointing Devices ......................................................................................................................... 75
Objective 2.5 Describe the main types of mice and pointing devices.
DIG DEEPER: How Touch Screens Work ........................................................................................................... 76
BITS&BYTES: Distributed Computing: Putting Your Computer to Work While You Sleep .................................... 77
Image, Sound, and Sensor Input ......................................................................................................................... 77
Objective 2.6 Explain how images, sounds, and sensor data are input into computing devices.
Output Devices ..................................................................................................................................................... 79
Image and Audio Output ..................................................................................................................................... 79
Objective 2.7 Describe options for outputting images and audio from computing devices.
BITS&BYTES: Foldable Phones Are Here ........................................................................................................... 81
Printers ................................................................................................................................................................ 81
Objective 2.8 Describe various types of printers, and explain when you would use them.
BITS&BYTES: CPUs That Fight Back ................................................................................................................. 84
TRY THIS: What’s Inside My Computer? ............................................................................................................ 86
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................... 87
Part 2: Processing, Storage, and Connectivity ................................................................................................................... 88
Learning Outcome 2.2 You will be able to describe how computers process and store data and how devices
connect to a computer system.
Processing and Memory on the Motherboard ................................................................................................... 88
The Motherboard and Memory ............................................................................................................................ 88
Objective 2.9 Describe the functions of the motherboard and RAM.
SOUND BYTE: Smartphones Are Really Smart ...................................................................................................................... 89
Processing .......................................................................................................................................................... 89
Objective 2.10 Explain the main functions of the CPU.
Storing Data and Information .............................................................................................................................. 90
Storage Options on Computing Devices .............................................................................................................. 90
Objective 2.11 Describe the various means of storing data and information with computing devices.
ETHICS IN IT: What Is Ethical Computing? ......................................................................................................... 92
TRENDS IN IT: Green Computing (Green IT) ...................................................................................................... 93
Connecting Peripherals to the Computer .......................................................................................................... 94
Computer Ports ................................................................................................................................................... 94
Objective 2.12 Describe common types of ports used today.
HELPDESK: Exploring Storage Devices and Ports .................................................................................................................. 94
Contents 5
Power Management and Ergonomics ................................................................................................................ 95
Power Controls and Power Management ............................................................................................................. 95
Objective 2.13 Describe how to manage power consumption on computing devices.
Setting It All Up: Ergonomics ............................................................................................................................... 97
Objective 2.14 Define ergonomics, and discuss the ideal physical setup for using computing devices.
BITS&BYTES: Coming Soon: USB 4 and DisplayPort 2 ...................................................................................... 97
SOLVE THIS: Technology Wish List .................................................................................................................. 107
Chapter 3
Using the Internet: Making the Most of the Web’s Resources ............................. 108
Part 1: Collaborating and Working on the Web ............................................................................................................... 110
Learning Outcome 3.1 You will be able to explain how the Internet works and how it is used for c ollaboration,
communication, commerce, and entertainment purposes.
The Internet and How It Works ......................................................................................................................... 110
The Origin of the Internet ................................................................................................................................... 110
Objective 3.1 Describe how the Internet got its start.
How the Internet Works ..................................................................................................................................... 112
Objective 3.2 Explain how data travels on the Internet.
Collaborating and Communicating on the Web ............................................................................................... 113
Collaborating with Web Technologies ................................................................................................................ 113
Objective 3.3 Evaluate the tools and technologies used to collaborate on the web.
BITS&BYTES: Secure Messaging Apps ............................................................................................................ 115
SOUND BYTE: Blogging ...................................................................................................................................................... 115
Communicating over the Web ........................................................................................................................... 117
Objective 3.4 Summarize the technologies used to communicate over the web.
Conducting Business on the Web ..................................................................................................................... 120
Conducting Business Online .............................................................................................................................. 120
Objective 3.5 Describe how business is conducted using the Internet.
E-Commerce Safeguards .................................................................................................................................. 120
Objective 3.6 Summarize precautions you should take when doing business online.
DIG DEEPER: How Cloud Computing Works ................................................................................................... 121
BITS&BYTES: Looking for Extra Money? Try a Side Hustle ............................................................................... 122
HELPDESK: Doing Business Online ..................................................................................................................................... 123
BITS&BYTES: Bitcoin: A Form of Virtual Currency ............................................................................................ 123
TRY THIS: Use OneDrive to Store and Share Your Files in the Cloud ................................................................ 125
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 126
Part 2: Using the Web Effectively ...................................................................................................................................... 127
Learning Outcome 3.2 You will be able to describe the tools and techniques required to navigate and search the web.
Accessing and Moving Around the Web .......................................................................................................... 127
Web Browsers ................................................................................................................................................... 127
Objective 3.7 Explain what web browsers are, and describe their common features.
URLs, Protocols, and Domain Names ............................................................................................................... 129
Objective 3.8 Explain what a URL is and discuss its main parts.
Navigating the Web ........................................................................................................................................... 130
Objective 3.9 Describe tools used to navigate the web.
BITS&BYTES: Maintain Your Privacy While Searching the Web ......................................................................... 131
Searching the Web Effectively ........................................................................................................................... 132
Using Search Engines ....................................................................................................................................... 132
Objective 3.10 Describe the types of tools used to search the web, and summarize strategies used to refine search results.
6 Contents
BITS&BYTES: Digital Assistants and Predictive Search ..................................................................................... 133
SOUND BYTE: Finding Information on the Web .................................................................................................................... 135
Evaluating Websites .......................................................................................................................................... 135
Objective 3.11 Describe how to evaluate a website to ensure it is appropriate to use for research purposes.
HELPDESK: Evaluating Websites ......................................................................................................................................... 135
TRENDS IN IT: Linked Data and the Semantic Web ......................................................................................... 136
BITS&BYTES: Why Isn’t Wikipedia Good to Use as a Source for a Research Paper? ....................................... 137
Using the Web Ethically ..................................................................................................................................... 137
Digital Activism .................................................................................................................................................. 137
Objective 3.12 Demonstrate an understanding of the ethical issues regarding digital activism.
Geolocation ....................................................................................................................................................... 138
Objective 3.13 Demonstrate an understanding of the ethical issues regarding location tracking applications and devices.
BITS&BYTES: Human-Implanted Data Chips: Protection or Invasive Nightmare? ............................................. 139
ETHICS IN IT: Cyber Harassment ..................................................................................................................... 140
SOLVE THIS: Create a Report: Conducting Research on the Web .................................................................... 147
Chapter 4
Application Software: Programs That Let You Work and Play ............................. 148
Part 1: Accessing, Using, and Managing Software .......................................................................................................... 150
Learning Outcome 4.1 You will be able to explain the ways to access and use software and describe how to best
manage your software.
Software Basics .................................................................................................................................................. 150
Application vs. System Software ........................................................................................................................ 150
Objective 4.1 Compare application software and system software.
Distributing Software ......................................................................................................................................... 150
Objective 4.2 Explain the differences between commercial software and open source software and describe models for
software distribution.
BITS&BYTES: Finding Alternative Software ....................................................................................................... 151
Managing Your Software ................................................................................................................................... 151
Purchasing Software ......................................................................................................................................... 151
Objective 4.3 Explain the different options for purchasing software.
TRENDS IN IT: Mobile Payment Apps: The Power of M-Commerce ................................................................. 152
HELPDESK: Buying and Installing Software .......................................................................................................................... 153
Installing and Uninstalling Software .................................................................................................................... 153
Objective 4.4 Describe how to install and uninstall software.
BITS&BYTES: Ridding Your Computer of “Bloat” .............................................................................................. 153
Upgrading Software .......................................................................................................................................... 154
Objective 4.5 Explain the considerations around the decision to upgrade your software.
DIG DEEPER: How Number Systems Work ...................................................................................................... 154
Software Licenses ............................................................................................................................................. 155
Objective 4.6 Explain how software licenses function.
SOUND BYTE: Where Does Binary Show Up? ..................................................................................................................... 155
ETHICS IN IT: Can I Install Software That I Don’t Own? .................................................................................... 157
TRY THIS: Citing Website Sources ................................................................................................................... 159
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 160
Part 2: Application Software ............................................................................................................................................. 161
Learning Outcome 4.2 Describe the different types of application software used for productivity and multimedia.
Productivity and Business Software ................................................................................................................. 161
Productivity Software ......................................................................................................................................... 161
Objective 4.7 Categorize the types of application software used to enhance productivity and describe their uses
and features.
Contents 7
BITS&BYTES: Productivity Software Tips and Tricks ......................................................................................... 161
BITS&BYTES: How to Open Unknown File Types ............................................................................................. 162
BITS&BYTES: Going Beyond PowerPoint ......................................................................................................... 166
SOUND BYTE: Programming for End Users.......................................................................................................................... 168
Business Software ............................................................................................................................................. 170
Objective 4.8 Summarize the types of software that large and small businesses use.
BITS&BYTES: Need to Work as a Team? Try These Collaboration Tools ........................................................... 172
Multimedia and Educational Software .............................................................................................................. 172
Digital Multimedia Software ............................................................................................................................... 172
Objective 4.9 Describe the uses and features of digital multimedia software.
Digital Audio Software ....................................................................................................................................... 174
Objective 4.10 Describe the uses and features of digital audio software.
HELPDESK: Choosing Software ........................................................................................................................................... 175
App Creation Software ...................................................................................................................................... 175
Objective 4.11 Describe the features of app creation software.
BITS&BYTES: Mirror, Mirror . . . ........................................................................................................................ 177
Educational and Reference Software ................................................................................................................. 177
Objective 4.12 Categorize educational and reference software and explain their features.
SOLVE THIS: Analyzing Benchmark Data ......................................................................................................... 185
Chapter 5
System Software: The Operating System, Utility Programs,
and File Management ............................................................................................ 186
Part 1: Understanding System Software .......................................................................................................................... 188
Learning Outcome 5.1 You will be able to explain the types and functions of operating systems and explain the
steps in the boot process.
Operating System Fundamentals ...................................................................................................................... 188
Operating System Basics .................................................................................................................................. 188
Objective 5.1 Discuss the functions of the operating system.
Operating Systems for Personal Use ................................................................................................................. 188
Objective 5.2 Explain the most popular operating systems for personal use.
BITS&BYTES: Quick Assist .............................................................................................................................. 190
BITS&BYTES: Operating Systems for the Smart Home .................................................................................... 190
Operating Systems for Machinery, Networks, and Business .............................................................................. 191
Objective 5.3 Explain the different kinds of operating systems for machines, networks, and business.
ETHICS IN IT: The Great Debate: Is macOS Safer Than Windows? .................................................................. 192
What the Operating System Does ..................................................................................................................... 193
The User Interface ............................................................................................................................................. 194
Objective 5.4 Explain how the operating system provides a means for users to interact with the computer.
Hardware Coordination ..................................................................................................................................... 194
Objective 5.5 Explain how the operating system helps manage hardware such as the processor, memory, storage, and
peripheral devices.
SOUND BYTE: Using Windows Task Manager to Evaluate System Performance .................................................................. 194
Software Application Coordination ..................................................................................................................... 196
Objective 5.6 Explain how the operating system interacts with application software.
TRENDS IN IT: Are Personal Computers Becoming More Human? .................................................................. 197
Starting Your Computer ..................................................................................................................................... 198
The Boot Process .............................................................................................................................................. 198
Objective 5.7 Discuss the process the operating system uses to start up the computer and how errors in the boot
process are handled.
8 Contents
HELPDESK: Starting the Computer: The Boot Process ........................................................................................................ 200
TRY THIS: Using Virtual Desktops in Windows 10 ............................................................................................ 202
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 203
Part 2: Using System Software ......................................................................................................................................... 204
Learning Outcome 5.2 You will be able to describe how to use system software, including the user interface, file
management capabilities, and utility programs.
The Windows Interface ...................................................................................................................................... 204
Using Windows 10............................................................................................................................................. 204
Objective 5.8 Describe the main features of the Windows interface.
BITS&BYTES: Snip and Sketch ........................................................................................................................ 205
File Management ................................................................................................................................................ 207
Organizing Your Files ......................................................................................................................................... 207
Objective 5.9 Summarize how the operating system helps keep your computer organized and manages files and folders.
BITS&BYTES: Save Files in the Cloud .............................................................................................................. 209
BITS&BYTES: Using Storage Sense ................................................................................................................. 210
HELPDESK: Organizing Your Computer: File Management ................................................................................................... 211
Utility Programs .................................................................................................................................................. 213
Windows Administrative Utilities ......................................................................................................................... 214
Objective 5.10 Outline the tools used to enhance system productivity, back up files, and provide accessibility.
DIG DEEPER: How Disk Defragmenting Utilities Work ...................................................................................... 216
SOUND BYTE: Hard Disk Anatomy ...................................................................................................................................... 216
SOLVE THIS: Operating Systems: Analyzing Market Share ............................................................................... 225
Chapter 6
Understanding and Assessing Hardware: Evaluating Your System .................... 226
Part 1: Evaluating Key Subsystems .................................................................................................................................. 228
Learning Outcome 6.1 You will be able to evaluate your computer system’s hardware functioning, including
the CPU and memory subsystems.
Your Ideal Computing Device ............................................................................................................................ 228
Moore’s Law ..................................................................................................................................................... 228
Objective 6.1 Describe the changes in CPU performance over the past several decades.
Selecting a Computing Device ........................................................................................................................... 229
Objective 6.2 Compare and contrast a variety of computing devices.
Evaluating the CPU Subsystem ......................................................................................................................... 231
How the CPU Works ......................................................................................................................................... 231
Objective 6.3 Describe how a CPU is designed and how it operates.
BITS&BYTES: Liquid Cooling ........................................................................................................................... 235
Measuring CPU Performance ............................................................................................................................ 235
Objective 6.4 Describe tools used to measure and evaluate CPU performance.
DIG DEEPER: The Machine Cycle .................................................................................................................... 237
Evaluating the Memory Subsystem .................................................................................................................. 238
Random Access Memory .................................................................................................................................. 238
Objective 6.5 Discuss how RAM is used in a computer system.
Adding RAM ...................................................................................................................................................... 240
Objective 6.6 Evaluate whether adding RAM to a system is desirable.
HELPDESK: Evaluating Your CPU and RAM ......................................................................................................................... 240
SOUND BYTE: Installing RAM............................................................................................................................................... 241
TRY THIS: Measure Your System Performance ................................................................................................. 243
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 244
Contents 9
Part 2: Evaluating Other Subsystems and Making a Decision ....................................................................................... 245
Learning Outcome 6.2 You will be able to evaluate your computer system’s storage subsystem, media subsystem,
and reliability and decide whether to purchase a new system or upgrade an existing one.
Evaluating the Storage Subsystem ................................................................................................................... 245
Types of Storage Drives ..................................................................................................................................... 245
Objective 6.7 Classify and describe the major types of nonvolatile storage drives.
SOUND BYTE: Installing an SSD Drive.................................................................................................................................. 246
DIG DEEPER: How Storage Devices Work ....................................................................................................... 247
Storage Needs .................................................................................................................................................. 248
Objective 6.8 Evaluate the amount and type of storage needed for a system.
BITS&BYTES: How Hot Is My GPU? ................................................................................................................ 250
Evaluating the Media Subsystems .................................................................................................................... 251
Video Cards ...................................................................................................................................................... 251
Objective 6.9 Describe the features of video cards.
BITS&BYTES: Make Your Tablet a Second Monitor .......................................................................................... 253
TRENDS IN IT: USB 3.2 C Ports: One Port to Rule Them All! ........................................................................... 254
Sound Cards ..................................................................................................................................................... 255
Objective 6.10 Describe the features of sound cards.
HELPDESK: Evaluating Computer System Components ...................................................................................................... 255
Evaluating System Reliability and Moving On ................................................................................................. 257
Maintaining System Reliability ............................................................................................................................ 257
Objective 6.11 Describe steps you can take to optimize your system’s reliability.
Getting Rid of Your Old Computer ..................................................................................................................... 259
Objective 6.12 Discuss how to recycle, donate, or dispose of an older computer.
ETHICS IN IT: Free Hardware for All ................................................................................................................. 260
SOLVE THIS: Laptop Alternatives ..................................................................................................................... 267
Chapter 7
Networking: Connecting Computing Devices ....................................................... 268
Part 1: How Networks Function ........................................................................................................................................ 270
Learning Outcome 7.1 You will be able to explain the basics of networking, including the components needed to
create a network, and describe the different ways a network can connect to the Internet.
Networking Fundamentals ................................................................................................................................. 270
Understanding Networks ................................................................................................................................... 270
Objective 7.1 Describe computer networks and their pros and cons.
HELPDESK: Understanding Networking ............................................................................................................................... 271
Network Architectures ....................................................................................................................................... 272
Network Designs ............................................................................................................................................... 272
Objective 7.2 Explain the different ways networks are defined.
DIG DEEPER: P2P File Sharing ........................................................................................................................ 274
Network Components ........................................................................................................................................ 275
Transmission Media ........................................................................................................................................... 275
Objective 7.3 Describe the types of transmission media used in networks.
SOUND BYTE: Installing a Home Computer Network ........................................................................................................... 275
Basic Network Hardware ................................................................................................................................... 277
Objective 7.4 Describe the basic hardware devices necessary for networks.
Network Software .............................................................................................................................................. 278
Objective 7.5 Describe the type of software necessary for networks.
TRENDS IN IT: How Smart Is Your Home? ....................................................................................................... 279
10 Contents
Connecting to the Internet ................................................................................................................................. 279
Broadband Internet Connections ....................................................................................................................... 279
Objective 7.6 Summarize the broadband options available to access the Internet.
BITS&BYTES: Net Neutrality ............................................................................................................................. 280
BITS&BYTES: Who’s Not on Broadband? ........................................................................................................ 281
Wireless Internet Access ................................................................................................................................... 281
Objective 7.7 Summarize how to access the Internet wirelessly.
TRY THIS: Testing Your Internet Connection Speed .......................................................................................... 283
MAKE THIS: TOOL: Ping and Telnet ................................................................................................................. 284
Part 2: Your Home Network ............................................................................................................................................... 285
Learning Outcome 7.2 You will be able to describe what is necessary to install and configure a home n etwork and
how to manage and secure a wireless network.
Installing and Configuring Home Networks ..................................................................................................... 285
Planning Your Home Network ............................................................................................................................ 285
Objective 7.8 Explain what should be considered before creating a home network.
BITS&BYTES: Power Your Devices—Wirelessly ................................................................................................ 286
Connecting Devices to a Network ..................................................................................................................... 286
Objective 7.9 Describe how to set up a home network.
BITS&BYTES: Mesh Networks: An Emerging Alternative .................................................................................. 288
BITS&BYTES: Analyzing Network Problems ..................................................................................................... 290
Managing and Securing Wireless Networks .................................................................................................... 290
Troubleshooting Wireless Network Problems ..................................................................................................... 290
Objective 7.10 Describe the potential problems with wireless networks and the means to avoid them.
Securing Wireless Networks .............................................................................................................................. 290
Objective 7.11 Describe how to secure wireless home networks.
SOUND BYTE: Securing Wireless Networks ......................................................................................................................... 292
HELPDESK: Managing and Securing Your Wireless Network ............................................................................................... 292
SOLVE THIS: Home Networking Guide ............................................................................................................. 299
Chapter 8
Managing Your Digital Lifestyle: Challenges and Ethics ...................................... 300
Part 1: The Impact of Digital Information ........................................................................................................................ 302
Learning Outcome 8.1 You will be able to describe the nature of digital signals; how digital technology is used to
produce and distribute digital texts, music, and video; and the challenges in managing a digital lifestyle.
Digital Basics ...................................................................................................................................................... 302
Digital Convergence and the Internet of Things .................................................................................................. 302
Objective 8.1 Describe how digital convergence and the Internet of Things have evolved.
Digital versus Analog ......................................................................................................................................... 304
Objective 8.2 Explain the differences between digital and analog signals.
Digital Publishing ................................................................................................................................................ 306
e-Readers ......................................................................................................................................................... 306
Objective 8.3 Describe the different types of e-readers.
Using e-Texts ..................................................................................................................................................... 307
Objective 8.4 Explain how to purchase, borrow, and publish e-texts.
HELPDESK: Managing Digital Media .................................................................................................................................... 307
Digital Music ....................................................................................................................................................... 308
Creating and Storing Digital Music ..................................................................................................................... 308
Objective 8.5 Describe how digital music is created and stored.
Distributing Digital Music ................................................................................................................................... 310
Objective 8.6 Summarize how to listen to and publish digital music.
Contents 11
Digital Media ....................................................................................................................................................... 311
Digital Photography ........................................................................................................................................... 311
Objective 8.7 Explain how best to create, print, and share digital photos.
SOUND BYTE: Enhancing Photos with Image-Editing Software ........................................................................................... 312
Digital Video ...................................................................................................................................................... 313
Objective 8.8 Describe how to create, edit, and distribute digital video.
TRENDS IN IT: Digital Asset Managers Needed! .............................................................................................. 316
Managing Your Digital Lifestyle ......................................................................................................................... 316
Digital Challenges and Dilemmas ....................................................................................................................... 317
Objective 8.9 Discuss the challenges in managing an active digital lifestyle.
DIG DEEPER: Deep Web versus Dark Web: Are There Places You Shouldn’t Go? ........................................... 318
BITS&BYTES: The Rise of Wearable Technology .............................................................................................. 319
BITS&BYTES: Goodbye Net Neutrality. . .Hello Bandwidth Throttling ................................................................ 321
TRY THIS: Creating and Publishing a Movie ...................................................................................................... 323
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 324
Part 2: Ethical Issues of Living in the Digital Age ........................................................................................................... 325
Learning Outcome 8.2 You will be able to describe how to respect digital property and use it in ways that maintain
your digital reputation.
Protection of Digital Property ............................................................................................................................ 325
Intellectual Property ........................................................................................................................................... 325
Objective 8.10 Describe the various types of intellectual property.
Copyright Basics ............................................................................................................................................... 326
Objective 8.11 Explain how copyright is obtained and the rights granted to the owners.
HELPDESK: Understanding Intellectual Property and Copyright ........................................................................................... 328
Copyright Infringement ...................................................................................................................................... 329
Objective 8.12 Explain copyright infringement, summarize the potential consequences, and describe situations in which
you can legally use copyrighted material.
BITS&BYTES: Software Piracy: It’s More Than Just Downloading and Copying ................................................ 331
BITS&BYTES: Your Tax Dollars at Work: Free Media without Permission! .......................................................... 333
Living Ethically in the Digital Era ....................................................................................................................... 334
Plagiarism ......................................................................................................................................................... 334
Objective 8.13 Explain plagiarism and strategies for avoiding it.
Hoaxes and Digital Manipulation ........................................................................................................................ 336
Objective 8.14 Describe hoaxes and digital manipulation.
SOUND BYTE: Plagiarism and Intellectual Property .............................................................................................................. 336
Protecting Your Online Reputation ..................................................................................................................... 339
Objective 8.15 Describe what comprises your online reputation and how to protect it.
BITS&BYTES: Celebrity Photographic Rights .................................................................................................... 341
ETHICS IN IT: Acceptable Use Policies: What You Can and Can’t Do ............................................................... 342
SOLVE THIS: Intellectual Property and Copyright Basics .................................................................................. 349
Chapter 9
Securing Your System: Protecting Your Digital Data and Devices ....................... 350
Part 1: Threats to Your Digital Assets ............................................................................................................................... 352
Learning Outcome 9.1 You will be able to describe hackers, viruses, and other online annoyances and the threats
they pose to your digital security.
Identity Theft and Hackers ................................................................................................................................ 352
Identity Theft ..................................................................................................................................................... 353
Objective 9.1 Describe how identity theft is committed and the types of scams identity thieves perpetrate.
12 Contents
Hacking ............................................................................................................................................................. 353
Objective 9.2 Describe the different types of hackers and the tools they use.
BITS&BYTES: Next Generation White Hat Hackers .......................................................................................... 354
Computer Viruses ............................................................................................................................................... 357
Virus Basics ....................................................................................................................................................... 357
Objective 9.3 Explain what a computer virus is, why it is a threat to your security, how a computing device catches
a virus, and the symptoms it may display.
SOUND BYTE: Protecting Your Computer ............................................................................................................................ 358
Types of Viruses ................................................................................................................................................ 359
Objective 9.4 List the different categories of computer viruses, and describe their behaviors.
Online Annoyances and Social Engineering .................................................................................................... 360
Online Annoyances ............................................................................................................................................ 361
Objective 9.5 Explain what malware, spam, and cookies are and how they impact your security.
Social Engineering ............................................................................................................................................. 363
Objective 9.6 Describe social engineering techniques, and explain strategies to avoid falling prey to them.
BITS&BYTES: I Received a Data Breach Letter . . . Now What? ....................................................................... 364
ETHICS IN IT: You’re Being Watched . . . But Are You Aware You’re Being Watched? ...................................... 366
HELPDESK: Threats to Your Digital Life ................................................................................................................................ 366
TRENDS IN IT: Spear Phishing: The Bane of Data Breaches ............................................................................ 367
TRY THIS: Testing Your Network Security ......................................................................................................... 369
MAKE THIS: App Inventor 2 or Thunkable ........................................................................................................ 370
Part 2: Protecting Your Digital Property ............................................................................................................................ 371
Learning Outcome 9.2 Describe various ways to protect your digital property and data from theft and corruption.
Restricting Access to Your Digital Assets ........................................................................................................ 371
Firewalls ............................................................................................................................................................ 371
Objective 9.7 Explain what a firewall is and how a firewall protects your computer from hackers.
Preventing Virus Infections ................................................................................................................................. 373
Objective 9.8 Explain how to protect your computer from virus infection.
HELPDESK: Understanding Firewalls ................................................................................................................................... 373
Authentication: Passwords and Biometrics ........................................................................................................ 376
Objective 9.9 Describe how passwords and biometric characteristics can be used for user authentication.
BITS&BYTES: CAPTCHA: Keeping Websites Safe from Bots ........................................................................... 376
Anonymous Web Surfing: Hiding from Prying Eyes ............................................................................................ 378
Objective 9.10 Describe ways to surf the Web anonymously.
BITS&BYTES: Multi-Factor Authentication: Don’t Rely Solely on Passwords! .................................................... 380
Keeping Your Data Safe ..................................................................................................................................... 380
Protecting Your Personal Information ................................................................................................................. 380
Objective 9.11 Describe the types of information you should never share online.
SOUND BYTE: Managing Computer Security with Windows Tools ....................................................................................... 380
Backing Up Your Data ....................................................................................................................................... 381
Objective 9.12 List the various types of backups you can perform on your computing devices, and explain
the various places you can store backup files.
Protecting Your Physical Computing Assets ................................................................................................... 385
Environmental Factors and Power Surges .......................................................................................................... 385
Objective 9.13 Explain the negative effects environment and power surges can have on computing devices.
Preventing and Handling Theft ........................................................................................................................... 385
Objective 9.14 Describe the major concerns when a device is stolen and strategies for solving the problems.
DIG DEEPER: Computer Forensics: How It Works ........................................................................................... 387
SOLVE THIS: Computer Security ...................................................................................................................... 395
Contents 13
Chapter 10
Behind the Scenes: Software Programming ......................................................... 396
Part 1: Understanding Programming ............................................................................................................................... 398
Learning Outcome 10.1 You will be able to describe the life cycle of a software project and identify the stages in the
program development life cycle.
Life Cycle of an Information System ................................................................................................................. 398
The Importance of Programming ....................................................................................................................... 398
Objective 10.1 Describe the importance of programming to both software developers and users.
System Development Life Cycle ........................................................................................................................ 398
Objective 10.2 Summarize the stages of the system development life cycle.
BITS&BYTES: The Agile Scrum ........................................................................................................................ 400
Life Cycle of a Program ...................................................................................................................................... 400
The Program Development Life Cycle ................................................................................................................ 400
Objective 10.3 Define programming and list the steps in the program development life cycle.
The Problem Statement ..................................................................................................................................... 401
Objective 10.4 Describe how programmers construct a complete problem statement from a description of a task.
SOUND BYTE: Using the Arduino Microcontroller.................................................................................................................. 401
HELPDESK: Understanding Software Programming.............................................................................................................. 402
Algorithm Development ..................................................................................................................................... 403
Objective 10.5 Explain how programmers use flow control and design methodologies when developing algorithms.
BITS&BYTES: Coding with a Purpose .............................................................................................................. 406
DIG DEEPER: The Building Blocks of Programming Languages: Syntax, Keywords,
Data Types, and Operators ........................................................................................................................... 408
Coding .............................................................................................................................................................. 409
Objective 10.6 Discuss the categories of programming languages and the roles of the compiler and the integrated
development environment in coding.
Debugging ........................................................................................................................................................ 415
Objective 10.7 Identify the role of debugging in program development.
BITS&BYTES: Many Languages on Display ...................................................................................................... 416
Testing and Documentation ............................................................................................................................... 416
Objective 10.8 Explain the importance of testing and documentation in program development.
TRY THIS: Programming with Corona ............................................................................................................... 418
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 419
Part 2: Programming Languages ...................................................................................................................................... 420
Learning Outcome 10.2 You will understand the factors programmers consider when selecting an a ppropriate
programming language for a specific problem and will be familiar with some modern programming languages.
Many Programming Languages ........................................................................................................................ 420
Need for Diverse Languages ............................................................................................................................. 420
Objective 10.9 Discuss the driving factors behind the popularity of various programming languages.
SOUND BYTE: Programming with the Processing Language................................................................................................. 420
Selecting the Right Language ............................................................................................................................ 421
Objective 10.10 Summarize the considerations in identifying an appropriate programming language for a specific setting.
BITS&BYTES: Learn to Code for Free at freeCodeCamp .................................................................................. 421
ETHICS IN IT: When Software Runs Awry ........................................................................................................ 422
Exploring Programming Languages ................................................................................................................. 423
Tour of Modern Languages ................................................................................................................................ 423
Objective 10.11 Compare and contrast modern programming languages.
BITS&BYTES: Your Software Portfolio .............................................................................................................. 427
TRENDS IN IT: Emerging Technologies: Unite All Your Video Game Design Tools ............................................. 431
14 Contents
Future of Programming Languages .................................................................................................................... 431
Objective 10.12 State key principles in the development of future programming languages.
HELPDESK: A Variety of Programming Languages................................................................................................................ 432
SOLVE THIS: Time Sheets ................................................................................................................................ 439
Chapter 11
Behind the Scenes: Databases and Information Systems ................................... 440
Part 1: Database Fundamentals ........................................................................................................................................ 442
Learning Outcome 11.1 You will be able to explain the basics of databases, including the most common types of
databases and the functions and components of relational databases in particular.
The Need for Databases .................................................................................................................................... 442
Database Basics ............................................................................................................................................... 442
Objective 11.1 Explain what a database is and why databases are useful.
Database Types .................................................................................................................................................. 444
Flat Databases .................................................................................................................................................. 444
Objective 11.2 Describe features of flat databases.
Relational Databases ......................................................................................................................................... 446
Objective 11.3 Describe features of relational databases.
BITS&BYTES: Normal Forms ............................................................................................................................ 447
Object-Oriented Databases ............................................................................................................................... 447
Objective 11.4 Describe features of object-oriented databases.
Multidimensional Databases .............................................................................................................................. 447
Objective 11.5 Describe features of multidimensional databases.
HELPDESK: Using Databases............................................................................................................................................... 447
NoSQL Databases ............................................................................................................................................ 448
Objective 11.6 Describe how Web 2.0 data is managed in a database.
Using Databases ................................................................................................................................................. 449
Relational Database Components and Functions ............................................................................................... 449
Objective 11.7 Describe how relational databases organize and define data.
SOUND BYTE: Creating and Querying an Access Database................................................................................................. 452
BITS&BYTES: Music Streaming Services Use Databases ................................................................................. 453
Inputting and Managing Data ............................................................................................................................. 453
Objective 11.8 Describe how data is inputted and managed in a database.
DIG DEEPER: Structured Query Language (SQL) ............................................................................................. 458
BITS&BYTES: Data Dashboards: Useful Visualization Tools .............................................................................. 460
TRY THIS: Using Excel’s Database Functions ................................................................................................... 462
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 463
Part 2: How Businesses Use Databases ........................................................................................................................... 464
Learning Outcome 11.2 You will be able to explain how businesses use data warehouses, data marts, and data mining to
manage data and how business information systems and business intelligence are used to make business decisions.
Data Warehousing and Storage ........................................................................................................................ 464
Data Warehouses and Data Marts ..................................................................................................................... 464
Objective 11.9 Explain what data warehouses and data marts are and how they are used.
HELPDESK: How Businesses Use Databases....................................................................................................................... 464
BITS&BYTES: Data Warehouses Are Going to the Cloud ................................................................................. 465
Data Mining ....................................................................................................................................................... 466
Objective 11.10 Describe data mining and how it works.
BITS&BYTES: Hadoop: How Big Data Is Being Managed ................................................................................ 467
ETHICS IN IT: Data, Data Everywhere—But Is It Protected? ............................................................................. 469
Contents 15
Using Databases to Make Business Decisions ............................................................................................... 469
Business Information Systems ........................................................................................................................... 469
Objective 11.11 Describe the main types of business information systems and how they are used by business managers.
SOUND BYTE: Analyzing Data with Microsoft Power BI Suite.............................................................................. 474
BITS&BYTES: Virtual Agents: Expert Systems Replace People on the Web ...................................................... 474
TRENDS IN IT: Mobile Business Intelligence ..................................................................................................... 475
SOLVE THIS: College Database ........................................................................................................................ 483
Chapter 12
Behind the Scenes: Networking and Security in the Business World ................. 484
Part 1: Client/Server Networks and Topologies ............................................................................................................... 486
Learning Outcome 12.1 You will be able to describe common types of client/server networks, servers found on them,
and network topologies used to construct them.
Client/Server Network Basics ........................................................................................................................... 486
Networking Advantages .................................................................................................................................... 486
Objective 12.1 List the advantages for businesses of installing a network.
Comparing Client/Server and Peer-to-Peer Networks ........................................................................................ 487
Objective 12.2 Explain the differences between a client/server network and a peer-to-peer network.
Types of Client/Server Networks ........................................................................................................................ 488
Objective 12.3 Describe the common types of client/server networks as well as other networks businesses use.
BITS&BYTES: Make Your Browser Protect You! ............................................................................................... 491
Servers and Network Topologies ...................................................................................................................... 492
Servers .............................................................................................................................................................. 492
Objective 12.4 List the common types of servers found on client/server networks.
HELPDESK: Using Servers ................................................................................................................................................... 493
TRENDS IN IT: Virtualization: Making Servers Work Harder .............................................................................. 494
Network Topologies ........................................................................................................................................... 495
Objective 12.5 Describe the common types of network topologies and the advantages and disadvantages of each one.
SOUND BYTE: Network Topology and Navigation Devices.................................................................................................... 497
TRY THIS: Sharing Printers on a Network Using Windows ................................................................................ 502
MAKE THIS: TOOL: App Inventor 2 or Thunkable ............................................................................................. 503
Part 2: Setting Up Business Networks ............................................................................................................................. 504
Learning Outcome 12.2 You will be able to describe transmission media, network operating system software, and network
navigation devices and explain major threats to network security and how to mitigate them.
Transmission Media ........................................................................................................................................... 504
Wired and Wireless Transmission Media ............................................................................................................ 504
Objective 12.6 Describe the types of wired and wireless transmission media used in networks.
BITS&BYTES: Guidance on Green Computing ................................................................................................. 506
Network Adapters and Navigation Devices ..................................................................................................... 506
Network Adapters ............................................................................................................................................. 506
Objective 12.7 Describe how network adapters help data move around a network.
MAC Addresses ................................................................................................................................................ 508
Objective 12.8 Define MAC addresses, and explain how they are used to move data around a network.
Switches, Bridges, and Routers ........................................................................................................................ 509
Objective 12.9 List the various network navigation devices, and explain how they help route data through networks.
HELPDESK: Transmission Media and Network Adapters ...................................................................................................... 510
Network Operating Systems and Network Security ....................................................................................... 510
Network Operating Systems .............................................................................................................................. 511
Objective 12.10 Explain why network operating systems are necessary for networks to function.
BITS&BYTES: Extending Smart Homes: Smart Yards Coming Soon! ................................................................ 511
16 Contents
Client/Server Network Security .......................................................................................................................... 512
Objective 12.11 List major security threats to networks, and explain how network administrators mitigate these threats.
DIG DEEPER: The OSI Model: Defining Protocol Standards ............................................................................. 513
SOUND BYTE: A Day in the Life of a Network Technician ..................................................................................................... 514
ETHICS IN IT: How Should Companies Handle Data Breaches? ...................................................................... 517
BITS&BYTES: Logging in? Try Finger Vein Recognition ..................................................................................... 518
SOLVE THIS: Cyber-Security Flyer and Mail Merge ........................................................................................... 525
Chapter 13
Behind the Scenes: How the Internet Works ........................................................ 526
Part 1: Inner Workings of the Internet ............................................................................................................................. 528
Learning Outcome 13.1 You will be able to explain how the Internet is managed and the details of how data is
transmitted across the Internet.
Internet Management and Networking ............................................................................................................. 528
Management ..................................................................................................................................................... 528
Objective 13.1 Describe the management of the Internet.
Networking Components ................................................................................................................................... 529
Objective 13.2 Explain how the Internet’s networking components interact.
Data Transmission ............................................................................................................................................. 530
Objective 13.3 List and describe the Internet protocols used for data transmission.
BITS&BYTES: A Free Cloud-Based Server for You ........................................................................................... 530
Internet Identity ................................................................................................................................................... 533
IP Addresses ..................................................................................................................................................... 533
Objective 13.4 Explain how each device connected to the Internet is assigned a unique address.
HELPDESK: Understanding IP Addresses, Domain Names, and Protocols ........................................................................... 533
BITS&BYTES: What’s Your IP Address? ........................................................................................................... 534
BITS&BYTES: Amazing Applications of IoT ....................................................................................................... 534
SOUND BYTE: Creating Web Pages with Squarespace ....................................................................................................... 535
DIG DEEPER: Connection-Oriented Versus Connectionless Protocols .............................................................. 536
Domain Names ................................................................................................................................................. 537
Objective 13.5 Discuss how a numeric IP address is changed into a readable name.
BITS&BYTES: Scale Up for Success ................................................................................................................ 538
TRY THIS: Ping Me ........................................................................................................................................... 541
MAKE THIS: TOOL App Inventor 2 or Thunkable .............................................................................................. 542
Part 2: Coding and Communicating on the Internet ....................................................................................................... 543
Learning Outcome 13.2 You will be able to describe the web technologies used to develop web applications.
Web Technologies .............................................................................................................................................. 543
Web Development ............................................................................................................................................. 543
Objective 13.6 Compare and contrast a variety of web development languages.
BITS&BYTES: CodePen: An Editing Community for Web Designers ................................................................. 544
Application Architecture ..................................................................................................................................... 546
Objective 13.7 Compare and contrast server-side and client-side application software.
SOUND BYTE: Client-Side Web Page Development ............................................................................................................. 547
BITS&BYTES: Repl It ........................................................................................................................................ 549
Communications over the Internet ................................................................................................................... 549
Types of Internet Communication ...................................................................................................................... 549
Objective 13.8 Discuss the mechanisms for communicating via e-mail and instant messaging.
BITS&BYTES: AI and Your Inbox ...................................................................................................................... 551
Encryption ......................................................................................................................................................... 552
Objective 13.9 Explain how data encryption improves security.
Contents 17
BITS&BYTES: Numbers: We Wouldn’t Have Encryption Without Them! ........................................................... 553
ETHICS IN IT: Do We Really Want Strong Encryption? ..................................................................................... 554
HELPDESK: Keeping E-Mail Secure ..................................................................................................................................... 554
TRENDS IN IT: Cognitive Computing ............................................................................................................... 555
SOLVE THIS: Creating an HTML Document ..................................................................................................... 563
Appendix A
The History of the Personal Computer .................................................................. 564
Appendix B
Careers in IT ........................................................................................................... 576
Glossary������������������������������������������������������������������������������������������������������������������ 590
Index����������������������������������������������������������������������������������������������������������������������� 608
18 Contents
Learn Technology by Using
Technology in Action 16e
Technology in Action continues to be a bestseller because it delivers an engaging approach to teaching the topics and skills students
need to be digitally literate. Using practical content, hands-on projects, and interactive simulation activities, students are engaged
in learning.
Today’s students are more tech savvy than ever and they expect what they are learning in the classroom to be as current as their
Twitter feeds and social media updates Traditional print textbooks cannot keep up effectively, but e-texts and digital technology
can deliver a more up-to-date experience. So, for those customers using the Technology in Action etext, the 16th edition has been
thoroughly reviewed and updated to ensure coverage of the latest in technology. New topics such as foldable phones, CPUs that
fight back against malware, and bandwidth throttling (by ISPs) have been included and new Dig Deepers like XR Extended Reality
are included. When students read the etext, they will be learning about truly current and relevant topics.
The updates were made with the instructor in mind so that there is no real work for you to do – just know the content is timely and
check out the transition guide that provides the specifics on what has been updated or changed. The learning objectives and test
questions related to them have not been changed so that changes to your existing syllabi and quizzes should not be required. The
new features of the 16th edition are all still there, including the web-based survey activities that encourage students to engage with
their peers and develop critical thinking skills through the What Do You Think? questions. These activities along with the Tech in the
News updates at the beginning of each chapter, videos, interactive Helpdesk activities, Sound Byte lessons, IT simulations, and
a variety of hands-on projects all help students learn the concepts and skills they need to be digitally literate in today’s workplace.
And, if they are using MyLab IT, they can earn the Digital Competency badge to demonstrate their skills to potential employers.
Hallmarks
• Engaging question-and-answer writing style that helpdesk staffer assisting customers via a live chat using
approaches topics as students do. a decision-based simulation with a quiz.
• Ethics coverage throughout, including in end-of-chapter • Sound Byte audio lessons provide coverage of additional
activities, Point/Counterpoint ethical debate content found topics related to the chapter, including a brief quiz.
in relevant chapters, and a Sound Byte lesson on how to • IT Simulations provide an in-depth chapter scenario that
discuss and debate ethical issues. students work through in an active learning environment
• Hands-on learning with projects throughout each chapter: and complete with a brief quiz to demonstrate
• Try This projects allow students to practice and understanding. They have been redesigned for a more
demonstrate their proficiency with important topics. engaging and easier-to-use learning experience that helps
Each project is accompanied by a how-to video. students actively demonstrate understanding. They now
include a “presentation mode” so instructors can walk
• Solve This projects put the concepts students are
through the simulation in class or with students.
learning into action through real-world problem solving
using Microsoft Office programs. Grader project versions • Review and Quizzes
of most of these projects are in MyLab IT. • Check Your Understanding Quizzes provide a self-check
• Make This projects provide activities where students covering objectives in each part of the chapter so that
build programs that run on their mobile devices. students can see how well they are learning the content.
Twelve of the chapters have activities that build fully • The Chapter Quiz provides a way for students to test that
functional mobile apps, compatible with either Android they have learned the material from the entire chapter.
or iOS. Each project includes instructions and a • New “Chew on This” critical thinking questions require
how-to video. that students demonstrate their understanding through
• Interactive activities engage students in active learning written answers that are manually graded.
and demonstration of understanding: • Testbank Exams provide customizable prebuilt,
• Helpdesk interactive activities provide a review of autograded, objective-based questions covering the
chapter objectives by having students play the role of a chapter objectives.
What’s New?
• What Do You Think? discussion topics begin each chapter The Bits&Bytes: Is Dial-Up Still an Option? has been
with surveys that students complete. They then respond to updated.
follow-up questions related to the topic at the end of the The Bits&Bytes: 5G Is Coming—Is It Worth the Wait? has
chapter to encourage critical thinking. been deleted and content has been added to the text.
• Chew on This critical thinking questions at the end of each
Ethics in IT: Ethical Challenges of the Internet of Things has
chapter part, encourage students to think critically about
moved to Chapter 8.
the impact of technology on society.
A new Bits&Bytes: Power Your Devices Wirelessly has been
• Technology in the News (formerly TechBytes Weekly) lets
added.
you keep your class current with weekly technology news.
• Chapter 8 has been expanded to discuss the challenges Revisions to setting up a Windows home network have
students face in managing an active digital lifestyle such as been made to remove concept of homegroups.
the Dark Web, keeping data private, and using The Bits&Bytes: The Rise of Wearable Technology has
cryptocurrency. moved to Chapter 8.
• Images and quizzes have been updated throughout. A new Ethics in IT: Privacy Challenges of Delivering Free
• A new Try This project in Chapter 1—What Does Wi-Fi has been added.
Facebook Know About You?—lets students explore the
detailed information collected about them by the social Chapter 8
media platform. Ethics in IT: Ethical Challenges of the Internet of Things has
been relocated from Chapter 7.
A new objective, “Discuss the challenges in managing an
Summary of Chapter Updates active digital lifestyle,” has been added to the chapter.
All chapter Learning Outcomes and Learning Objectives have A new Dig Deeper, Deep Web versus Dark Web: Are There
been revised as needed and throughout the text, figures and Places You Shouldn’t Go?, has been added to the chapter.
photos have been updated with new images, current topics,
Bits&Bytes: The Rise of Wearable Technology has been
and state-of-the art technology coverage.
relocated from Chapter 7.
Chapter 1
Chapter 9
A new Try This exercise leading students through the steps to
examine the data stored about them by social media platforms A Bits&Bytes addressing the role of social media and computer
has been added. security in maintaining democratic elections has been added.
The section on technology and careers has been updated Extended treatment of password managers and biometric
with current trends and an emphasis on the impact of options for access control has been added.
artificial intelligence.
Chapter 10
Chapter 5 New coverage of programming technologies like Swift and JSON.
Discussions on additional mobile operating systems like
Chapter 11
watchOS and tvOS have been added.
The concept of flat databases has replaced discussion of lists.
Coverage of the latest smarthome devices and open-
source solutions has been added. New content of NoSQL databases has been added.
The Program
To maximize student results, we recommend using Technology in Action with MyLab IT,
the teaching and learning platform that empowers you to reach every student. By combining
trusted author content with digital tools and a flexible platform, MyLab IT personalizes the
learning experience and will help your students learn and retain key course concepts while
developing skills that future employers seek.
With MyLab IT for Technology in Action, students have access to all of the instruction, prac-
tice, review, and assessment resources in one place. There are two ways you can set up
your course:
1. You can choose to use the new sequential learning modules that allow you to create
activities in the order you want students to complete them, providing a consistent, mea-
surable learning experience from chapter to chapter.
2. You can take a second approach for an interactive learning experience, where
students use the etext to read and learn actively with Helpdesk activities, Sound Bytes,
IT Simulations, What do You Think? surveys and critical thinking questions, videos, and
more. You assign the etext chapter, students engage in learning and practice, and go
back to their assignments to take the chapter quizzes.
Interactives:
Ethics Try This Solve This Make This What do Helpdesks, Sound Team Time
Projects Projects Projects Projects you think? Bytes, IT Sims Projects Badge
Critical
x x x x X
Thinking
Communication x x x X
Collaboration x x x X
Knowledge
Application and x X x x x x X
Analysis
Social
x X x
Responsibility
apply what they are learning in Understanding what capabilities your current computer has is one of the first steps toward computer literacy. In this
exercise, you’ll learn how to explore the components of your Windows computer. For step-by-step instructions, watch
the Chapter 2 Try This video on MyLab IT.
lead students to explore Want to build your own Android app from scratch? You can, with a
simple tool called App Inventor. To get started, have ready:
a practical project that uses Step 1 To gather information about the storage devices on your computer, click File Explorer from the Taskbar. Then in the nav-
igation pane, click This PC to display information about your computer’s storage devices and network locations.
mobile app development • A computer connected to a Wi-Fi network
• The Chrome browser
guide students through the flash drives and external hard drives). device work for you is as easy as drag and
To display the System screen, click the drop with App Inventor.
Computer tab on the ribbon, and then
click System properties. App Inventor is a programming platform
project.
used to create apps for Android devices.
Using App Inventor, you can easily drag
and drop components to design your app’s
Step 3 Scroll down and you can gather quite a bit of Clock speed
Processor info
information from the About screen, such as:
• Version of Windows
• Type of processor
• Speed of the processor
• Amount of RAM installed
RAM info
• System type (32-bit or 64-bit)
System type
Make This 59
58 Chapter 2 Looking at Computers: Understanding the Parts
Helpdesk Activities
The Helpdesk training content,
created specifically for Tech- Solve This Projects
nology in Action, enables stu- Solve This MyLab IT Grader
dents to take on the role of a These exercises inte- Technology Wish List
You are in need of a significant technology upgrade, and your parents have told you they will help you finance your purchases by
loaning you the money. You will need to repay them with a modest 2.5% interest rate over two years. The only catch is that they
helpdesk staffer fielding ques- You will use the following skills as you complete this activity:
users so that students demon- Microsoft Office skills. • Use the SUM, PMT, and COUNTA Functions
Instructions
• Wrap Text
strate their understanding in Hint: To format cell styles, on the Home tab, in the Styles group, click Cell Styles.
3. Merge and Center A1 across columns A through F, and Center align the column headers in cells A3:F3.
Hint: To Merge and Center text, on the Home tab, in the Alignment group, click Merge & Center.
4. Modify column widths so that Column A is 25 and Column D is 45.
an active learning environ- Hint: To modify column widths, on the Home tab, in the Cells group, click Format, and then select Column Width.
5. In cells B4:E9, fill in the table with the Brand and Model of the six devices that you would like to purchase. The device
type is filled out for you. In the Reason column, write a brief note as to why this device will help you. (You’ll format the
text so it all displays later.) Enter the cost of the device in the Cost column. Don’t include tax and/or shipping.
Sound Bytes
11. In cell A11, type Estimated Tax, then in cell E11 create a formula that references the subtotal in cell E10 and multiplies
it by a tax of 6%. Format the results in the Accounting Number format with two decimals.
Hint: The formula will be =E10*0.06
12. In cell A12, type Estimated Shipping, then in cell E12 create a formula to calculate the shipping charge by using the
COUNTA function to determine the number of devices being purchased and then multiplying that by a $10 shipping
charge. Format the results in Accounting Number Format with two decimals.
IT Simulations
These detailed interactive scenarios cover a core chapter topic in a hands-on environment
where students can apply what they have learned and demonstrate understanding through
active engagement.
End-of-Chapter Answer Key, Check Your Understanding Answers to all end-of-chapter questions.
Answer Key, Chapter Quiz Answer Key
Make This Projects Activities where students build programs that run on their mobile
devices. Each project includes instructions and a how-to video.
Objectives Mapping Outline of the objectives in every chapter.
Solve This Projects Real-world problem solving using Microsoft Office programs.
Grader versions of most of these projects are in MyLab IT.
Syllabus Template Sample syllabus for help in setting up your course.
Test Bank (Textbook, Helpdesk, Sound Bytes) Over 1,000 multiple-choice, true/false, short-answer, and
matching questions with these annotations:
• Difficulty level (1 for straight recall, 2 for some analysis, 3 for
complex analysis)
• Objective, which provides location in the text
Provided for:
• Textbook
• Helpdesk
• Sound Byte
Contributors
S. H. Chung – Wawasan Open University
Ajay Mittal – University Institute of Engineering and Technology
Reviewers
Kaushik Goswami – St. Xavier’s College, Kolkata
Mazani Manaf – Universiti Teknologi MARA
Moumita Mitra Manna – Bangabasi College
Sandeep Singh – Jaypee Institute of Information Technology
1
The Impact of Technology
in a Changing World
For a chapter overview, watch the Chapter Overview videos.
PART 1 PART 2
MyLab IT All media accompanying this chapter can be found here. Make This A Virtual Assistant on page 40
(John M Lund Photography Inc/The Image Bank/Getty Images; Carlos Castilla/Shutterstock; Winui/Shuttertock; Ivan Trifonenko/123RF; Sergey Nivens/Shutterstock; Stuart
Miles/Fotolia)
30
JournalismCS
RoboticsCS
EducationCS
Psychology CS
MedicineCS
LiteratureCS
Theater CS
Biology CS
EconomicsCS
What do you think? HumanitiesCS
Having a background in technology and computer science enables you to be
a powerful contributor in many career fields. More universities are realizing this and
creating a new department, CS + X. What is CS + X? The CS stands for Computer
Science, while the X stands for a second area of study that blends with computer
technology. For example, the X might be Music, with the combined degree including
study of the perception of music and use of digital programming to create new
instruments. Or the X might be Archaeology, with the curriculum including courses
on the computer simulation of human behavior and creating virtual reality models.
Universities that are creating CS + X departments argue that combining computer
science with other skills produces students who are better journalists, artists,
scientists, and so on. The possibilities for collaboration between your passions and
technology are endless.
Which field would you be most curious about combining with CS?
• Literature • Nursing • Art
• Statistics • Criminal Justice • Other
• Business • Anthropology
31
See the end of the chapter for a follow-up question. (Jacob Lund/Shutterstock)
Part 1 For an overview of this part of the chapter, watch Chapter Overview Video 1.1.
Technology in Society
Learning Outcome 1.1 You will be able to discuss the impact of the tools of modern technology on
national and global issues.
Ask yourself: Why are you in this class? Maybe it’s a requirement for your degree, or maybe you want to improve your computer
skills. But let’s step back and look at the bigger picture.
Technology is a tool that enables us all to make an impact beyond our own lives. We’ve all seen movies that dangle the dream in
front of us of being the girl or guy who saves the world—and gets to drive a nice car while doing it!
Technology can be your ticket to doing just that by influencing and participating in projects that will change the world.
Crisis-Mapping Tool
Another example of the interaction of technology
and society is the software tool Ushahidi. Following
a disputed election in Kenya, violence broke out all
over the country. Nairobi lawyer Ory Okolloh tried to
get word of the violence out to the world through her
blog, but she couldn’t keep up with the volume of
Figure 1.1 Social media has changed how we access, distribute, and evaluate reports. However, two programmers saw her request
information. (Rudmer Zwerver/Shutterstock) for help and in a few days created Ushahidi. It is a
crisis-mapping tool that collects information from e-mails, text messages, blog posts, and tweets
and then maps them, instantly making the information publicly available. The developers then made
Ushahidi a free platform anyone in the world can use (see Figure 1.2). It has since been used in sev-
eral international disasters. In what other ways may technology help us face times of crisis?
Global Issues
Objective 1.2 Describe various global social issues that are being affected by technology.
Let’s look at the different global social issues that are being affected by technology.
Health Care
Infectious diseases account for about one-fifth of all deaths worldwide. Researchers say the odds of
a flu pandemic occurring in the next century are nearly 100%. Could technology help us develop and
deliver vaccines to save lives? Using scientific visualization tools, scientists are developing antibodies for
flu viruses and even HIV, viruses that are difficult to target because they continually change shape. Com-
putationally intense modeling software is helping researchers increase the pace of vaccine production.
As we learn more about the terrible consequences of concussion injuries, technology is playing a
part in providing a solution. Researchers now know that even without an actual concussion, ath-
letes can sustain serious damage from repeated impacts of their brain against the skull. Computer
programs have collected sensor data from impacts on the field, which scientists have analyzed and
used to create a new kind of helmet. College programs and the NFL now use enhanced helmets,
designed to better distribute the impact of collisions.
The Environment
What if every cell phone in the world had built-in atmospheric sensors? Then millions of points of
data measuring air and water quality from around the world could be acquired. The data could be
tagged with geographical information, alerting scientists to new trends in our environment. Ideas
like these are being explored by researchers around the world.
Smart Internet-connected water sprinklers are another technology that is already saving water in
California and other dry areas of the country. The sprinkler system checks the weather forecast so it won’t
use water when rain is coming the next day. The system is showing a 30% reduction in water usage.
Start Network Corruption Blockchain, a digitized Blockchain technology can help Start Network:
public ledger for track humanitarian aid funds startnetwork.org
recording a series of as they flow from donors to
transactions recipients.
SolaRoad/ The need for Solar cells Solar cells are integrated into the Netherlands SolaRoad:
Netherlands a renewable, asphalt roadway. They collect solaroad.nl
nonpolluting energy solar energy and distribute
resource electricity all day.
United Nations Issues of hunger for GIS (geographical The WFP can analyze the location World Food
World Food 1 in 7 of the world’s information systems) and need for food, positioning it Programme:
Programme population and mobile devices where it will help the most. wfp.org
(WFP)
Gates The threat of global Mobile apps, data Worldwide organizations like the Gates Foundation:
Foundation pandemic disease, like analytics, and enhanced Gates Foundation are taking steps gatesfoundation.org
Ebola, or weaponized global communications to build better networks to detect
biological warfare outbreaks and deliver vaccines.
Marketing
There are almost 2 billion views of videos each month on YouTube,
and marketers are taking note. Influencers are YouTube personalities
with huge followings and high levels of interaction with their followers.
Placing a product for review on their channel or showing a popular
YouTube celebrity using that product in their own life can be a huge
marketing win.
You know how to find information and You can avoid being overwhelmed You can how to diagnose and fix prob-
use the web effectively. by spam, adware, and spyware. lems with your hardware and software.
(Peter Dazeley/The Image Bank/Getty Images; Yuri_Arcurs/E+/Getty Images; Zakai/DigitalVision Vectors/Getty Images; Justin Lewis/Stone/Getty Images; Argus/Fotolia; Ivanastar/
Istock/Getty Images)
and Trojan horses? What software—the instructions that tell the computer what to do—should you
install on your computer to avoid online annoyances?
Being able to maintain, upgrade, and troubleshoot your computer. Learning how to care
Sound Byte MyLab IT
for and maintain your computer and knowing how to diagnose and fix certain problems can save
you time and money. Do you know how to upgrade your computer if you want more memory? Do Virtual Computer Tour
you know which software and computer settings can keep your computer in top shape? Under-
In this Sound Byte, you’ll take a
standing the hardware of your computing system is a critical part of your computer literacy. (See
video tour of the inside of a desk-
the Virtual Computer Tour Sound Byte to get started.)
top system unit; locate the power
Keeping up to date. Finally, becoming computer literate means knowing about new technologies supply, CPU, and memory; and
and how to integrate them into your life. Can you connect your TV to your wireless network? What learn more about what’s inside a
is a media server, and do you need one? Can a USB type C connection carry HDMI video signals? computer.
Being able to stay up to date with technology is an important skill.
This book will help you become computer literate. In Chapter 3, you’ll find out how to get the most
from the web while staying free from the spam and clutter Internet surfing can leave behind on your
computer. Chapter 6 shows you how to determine whether your hardware is limiting your comput-
er’s performance and how to upgrade or shop for a new device. Chapter 9 covers how to keep
your computer and your digital life secure. You’ll be able to save money, time, and frustration by
understanding the basics of how computer systems operate.
multiple choice
1. Which of the following organizations uses GIS b. subscriptions.
technology and mobile devices across its global c. crowdfunding.
operations?
d. collaborative consumption.
a. e-NABLE
4. Crowdfunding helps startup businesses by
b. The Witness Project
a. selling stock more easily.
c. United Nations World Food Program (WFP)
b. using QR codes to advertise and market products.
d. Next Einstein Initiative
c. gathering financial contributions from
2. Which of the following terms represents the difference supporters.
in the levels of Internet access and the availability of
d. replacing Web 2.0 technology.
technical tools in different parts of the world?
5. Collaborative consumption is when people get
a. social divide
together to
b. digital lag
a. find the best prices on products.
c. digital divide
b. increase the use of a single product by sharing
d. cognitive surplus access to it.
3. Nowadays, many companies, in a quest to improve c. fight diseases of the respiratory tract.
the quality of their products, take feedback from d. exchange reviews on services and goods they
consumers using have purchased.
a. crowdsourcing.
chew on
this
(Steve Young/Fotolia)
(rvlsoft/Shutterstock; Solomon7/Shutterstock)
Step 1 From the Facebook website, download your Facebook data. On the top line of your
Facebook page, click the dropdown arrow on the far right and select Settings. Next,
select Your Facebook Information and click Download Your Information. Click the
Create File button. Facebook will e-mail you when the file is ready.
Step 2 From the Twitter website, download the information Twitter has created on you.
Click on your Twitter avatar and select Settings and privacy. From the list on the left,
select Your Twitter data. Scroll to the bottom and under Download your Twitter data,
and click the Request data button. It will be e-mailed to you when the report is ready.
Step 3 Examine what these algorithms have decided about you. Check the list of interests
and what items they think you will likely buy. How accurately have they guessed
your household income, your politics, and your finances?
Try This 39
Make This TOOL: IFTTT.com
(If This Then That)
A Virtual Assistant
If This Then That (IFTTT.com) is an Internet-based tool that helps you get things done automatically. By using
“recipes” within this web-based tool, you can automate tasks you do during the day, such as:
• automatically silencing your phone when you go into class,
• automatically texting your manager when you’re on your way to work, or
• notifying you when the president signs a new law.
In this exercise, you’ll explore using IFTTT to create recipes like these.
Make the Internet work for you by knowing this one programming statement: IF THIS, THEN THAT.
(IFTTT Inc.)
(IFTTT Inc.)
Can computing devices really think? Are virtual assistants like Alexa intelligent, or do they just mimic thinking? Rapid
developments in the field of artificial intelligence have forced us to consider many new ethical debates. It’s important to learn
about new advancements in technology, such as artificial intelligence, as well as to understand the ethical dilemmas technology
presents.
Artificial Intelligence
Artificial intelligence focuses on creating computer systems that have an ability to perform tasks
associated with human intelligence. Let’s explore in detail what artificial intelligence is and how it
impacts you.
What is artificial intelligence? Artificial intelligence (AI) is a branch of computer science that MyLab IT
Helpdesk
focuses on creating computer systems able to perform tasks that are usually associated with
human intelligence. By this definition, any computer-controlled device that accomplishes something The Impact of Artificial
thought of as “intelligent” by humans is considered AI. Intelligence
Do computers “think” like human beings? In the 1950s, the goal was to create a machine In this Helpdesk, you’ll play the role
that could think like a human. Early examples included expert systems that mimicked doctors in of a helpdesk staffer, fielding ques-
diagnosing illnesses. But this goal has shifted somewhat toward creating machines that generate tions about artificial intelligence.
intelligent output but that do not necessarily mimic the human thought process.
Consider visiting the library. You could tell a human librarian your interests and the librarian could
ask you some questions and then recommend books you might like. The Amazon recommendation
engine fulfills the same purpose. However, the Amazon recommendation engine doesn’t mimic a
human librarian’s thought process but instead analyzes vast amounts of data about you and other
shoppers to make its recommendations. It provides intelligent results, but it does not arrive at those
results the same way a human would.
Artificial Intelligence 41
What are the main areas of research for AI? AI’s central goals can be grouped into a num-
ber of categories (see Table 1.3):
• Natural language processing (NLP): NLP works to develop AI systems that understand written
and spoken words and can interact with humans using language.
• Perception: AI systems have senses just as we do. AI systems use sonar, accelerometers,
infrared, magnetic, and other electronic sensors to gather data. Being able to combine all the
data from sensors and then construct information from it is a difficult challenge.
• Knowledge representation: Knowledge representation involves encoding information about
the world into formats that the AI system can understand. Humans possess a vast collec-
tion of general knowledge based on their experiences in the world. AI systems need to build
knowledge bases to solve problems. Developing a knowledge base and using it efficiently are
active areas of research and have been demonstrated effectively by IBM’s artificial intelligence
computer Watson.
• Planning: AI systems need to set goals and then achieve them. An AI system might need to plan
how to move a blue block out of the way to reach a red one or how to rotate a block as it moves
to fit through a narrow opening.
• Problem solving: Humans tend to make intuitive judgments when solving a problem rather than
perform a step-by-step analysis. AI programming combines a rules-based approach, along with
trying to make judgments with incomplete information.
• Learning: Like humans, AI algorithms adapt and learn through experience. Supervised learning
is used when the system can be trained with a huge number of examples. U nsupervised learning is
when a system can look at data and build rules on its own to decide what it is seeing.
What has enabled us to deploy effective AI systems? Many information technology devel-
opments have contributed to the functional AI systems that we have today.
Artificial neural networks (ANNs) are designed based on the structure of the human brain (see
Figure 1.6), which is a network of loosely connected neurons. When signals are received by a
neuron, it fires an electrical impulse and the signal travels to all the neurons connected to it. In
ANNs, digital signals take the place of biological signals. Many modern ANNs feature different lay-
ers of neurons that allow many degrees of complexity. ANNs have allowed researchers to tackle
complex problems such as speech recognition.
Machine Learning
Machine learning (ML) is a type of AI that doesn’t need to be specifically programmed. Instead, it
analyzes patterns in data, then uses the patterns to draw conclusions and adjust the actions of the
AI system accordingly. By learning, the AI system can adapt itself and become constantly better at
its task. You have interacted with these kinds of systems if you use Alexa, the Amazon voice recog-
nition device. Alexa gathers input from human speech and uses this information to become better
at understanding language over time.
Deep learning (DL) is a subset of the ML field that describes systems capable of learning from
mistakes, just as humans do. DL algorithms can learn from data that is not labeled as “correct” or
“incorrect.” The algorithm adapts to improve its final result without being presented with a huge,
labeled set of training data. This is known as unsupervised learning.
Having a basic understanding about AI systems is necessary to becoming a digitally literate citizen.
In the next section, we’ll explore various workplace systems that use AI.
Artificial Intelligence 43
Another random document with
no related content on Scribd:
“Pull him inside and shut the door,” Evan snapped. “I—er—find in
myself a certain adaptability.... Put on your wrap and hat. Hurry....
The front way. Keep out of sight. Can you drive a car?”
“Yes.”
“If one is standing in front—steal it.”
“Yes.”
“Now—go.”
“I—Oh, Evan.”
She was in his arms, and her lips to his. “I—If they kill you I shall die,
too.”
He opened the door and stared into the dimly lighted hall. “It is clear.
Go.”
“Good-by.”
“Go. You’re wasting time.” He pushed her through the door. “Our
best hope is that they—to my surprise—have underestimated me....
Good-by.... I—er—seem to have underestimated myself.... I seem to
have been—exceptionally inefficient in a field quite foreign to my
previous activities. Hasten.”
He shut the door and Carmel stood alone, dependent upon herself,
without other hope or reliance than in her own expedients. She
moved softly down the hall, reached the top of the stairs which led
downward to another hall and the front door. She listened. There
was no alarming sound.... She descended halfway and stopped
again. The lower hall, apparently, was in the middle of the house. To
the left was the room which had been the bar in the days when liquor
might be sold openly; at the right was the dining room. The door to
the dining room was closed; that into the bar stood open—and there
was her danger. She must pass that door without being seen. Once
outside, the danger decreased almost to a minimum. Could she
reach the shelter of the woods, she felt she would be safe.
She crept downward; reached the ground floor and flattened herself
against the wall. What if the front door should open and somebody
should enter?... She hesitated, then peered cautiously through the
door and into the bar.... As she did so she heard an automobile drive
up in front and stop.... In the bar she saw Peewee Bangs sitting, his
feet on a table, reading a newspaper.
Feet ascended the steps outside, and she cowered. A hand rattled
the knob, and she heard Bangs drop his feet to the floor, with the
scrape of his chair as he turned.... The door opened. Something, not
conscious volition, moved Carmel. As the door opened and a man
stepped in, she sprang forward, brushed past him, and ran down the
steps. Behind her she heard a shout—the squeaky voice of Peewee
Bangs.... Before her stood a Ford, its engine agitating the whole car,
and she ran toward it and threw herself into the seat. In an instant
she had grasped the wheel and adjusted her foot to the clutch....
Then she was conscious of a jar, and out of the corner of her eye
saw Bangs’s face, distorted with rage, saw his hand reaching for her
arm.... She screamed. Then her hand, chance led, fell upon the seat,
encountered a heavy wrench.... She lifted it, dashed it with all her
strength into that inhuman face.... It vanished.... The next thing of
which she became clearly conscious was of speed, of a rocking,
bounding car.... She was free, had escaped her pursuer, and was
rushing with every ounce of power the little car possessed toward
Gibeon....
Was there a car to follow her? A larger, more powerful, faster car?...
She did not know. She glanced behind. There was nothing yet, no
pursuing headlight. Carmel gripped the wheel and threw down the
gas lever to its final notch.... Around corners, through puddles, over
patches rutted by heavy wheels, she forced the little car. It rocked,
skidded, threatened, but always righted itself and kept on its way....
She looked behind again.... Headlights!... By this time she must be
half a mile or more from the hotel. It would be a good car which
could make up that lead in the short distance to Gibeon.... Yet, as
she looked back from time to time, the headlights drew closer and
closer.... She could see straggling lights now—the fringe of the
village.... Would they dare follow her into the town itself? She fancied
not.... The bridge lay before her—and the pursuing car roared not a
hundred yards behind. She swept across the river and sped down
Main Street at a rate never witnessed before by that drowsy
thoroughfare.... She was safe.... Before her was the Town Hall—
lighted brightly.... She looked back. The pursuing car was not to be
seen.
The town meeting! The citizens of Gibeon were there upon the
town’s business. She brought the car to a stop before the door,
leaped out, and ran up the stairs. The hall was crowded. On the
platform stood the chairman of the town board.... Carmel was
conscious of no embarrassment, only of the need for haste, of the
necessity for finding help. She entered the room and made her way
up the aisle to the platform. Without hesitating she mounted the
steps, unconscious of the craning of necks, the whisperings, the
curiosity her arrival was causing.
The chairman halted in his remarks. Carmel, in her excitement,
ignored him, almost shouldered him aside.
“Men—men of Gibeon,” she said, “crime is being committed,
perhaps murder is being done, at this minute.... What are you going
to do?”
CHAPTER XXVI
THE hall was still. It was as if, by some necromancy of words,
Carmel had turned to stone the town meeting of Gibeon. She looked
down into faces which seemed to her white and strained. The faces
waited. She had caught them by her words; gripped them.
Something was about to happen. Every man in the room felt the
imminence of grave events. The very air tingled with it as if waves of
some vital force agitated the air and discharged themselves with
such force as to be felt by physical touch.... It was Carmel Lee’s first
public appearance, yet she was not frightened. Rather she was
eager; words jostled with one another for the privilege of being
uttered first. She paused, staring down into those faces.
“Men of Gibeon,” she said, and her little fist, clenched with knuckles
showing white, lifted from her side and extended itself toward them,
“Men of Gibeon, I have found the body of Sheriff Churchill.... He was
murdered!...”
The faces seemed to move in unison as if they were painted upon a
single canvas and the canvas had been suddenly jerked by an
unseen hand. They became audible by an intake of the breath.
“I found him,” Carmel said, “close by the Lakeside Hotel.... Since
yesterday I have been a prisoner in the Lakeside Hotel, I and Evan
Pell.... I went to find him. I found Sheriff Churchill; I saw five great
trucks unload in the hotel yard, and those trucks were carrying
whisky from the other side of the border.... It was whisky, men of
Gibeon, which killed Sheriff Churchill. It was the men who are
trafficking in liquor who murdered him.... I know their names. I have
seen them and been their prisoner.... At this moment Evan Pell,
locked in a room of that unspeakable place, is in danger of his life.
He is injured, cannot escape nor defend himself. Yet he made it
possible for me to escape and to come to you for help....” Again she
paused.
“I could not go to the law because the law does not belong to the
people of Gibeon. It has been bought and paid for. It is owned by
criminals and by murderers.... We have a new sheriff.... That man’s
hands are red with the blood of the man whose place he fills.... So I
have come to you, for there is no other law in Gibeon to-night than
yourselves.”
There had been no movement, no sound, only that tense, fateful
silence.
“Will you permit this thing? Will you continue to allow your town and
your county to rest under this dreadful thing? You can stop it to-night.
You can wipe it out forever.... Let me tell you what I know.”
She spoke rapidly, eloquently. In that moment she was no longer a
young woman, but a leader, a prophet, one sent to deliver a
message, and she delivered it fittingly. Her words descended upon
those upturned faces, compelling belief. There could be no doubt....
She described the plot against herself as Bangs had recited it
tauntingly—how she was to have been made a thing to scorn and to
turn aside from; how that part of her which was more valuable to her
than life itself was to have been murdered. At the recital the faces
moved again, became audible again in a murmur which held kinship
with a snarl.... Gibeon was awakening.
Point by point, fact by fact, she drove home to them the conditions
among which they had been living, but one name she withheld until
the moment should come for its utterance.... She described the
activities of the whisky smugglers, the workings of their organization,
its power—the intelligence which directed it.
“Will you endure this, men of Gibeon?... No time may be lost. At this
instant a man stands under the shadow of death! What are you
going to do? Will you let him die?”
In the hall a man arose. “What is the name of this man—the man
who is to blame for all this?” he demanded.
“His name,” said Carmel, “is Abner Fownes!”
It was as if they had expected it; there was no demonstration, no
confusion. The men of Gibeon were strangely unmoved, strangely
silent, strangely stern. It was as if they were moved by a common
impulse, a common determination. They were not many individuals,
but a single entity.... They had been molded into solidity—and that
solidity was Gibeon.
The faces were faces no longer, but human beings, men standing
erect as if waiting for a signal.... Among them Carmel saw Jared
Whitefield. His eyes encountered hers, and he nodded....
“Will you come with me?” she cried. “Will you follow me?... Those
who will follow—come!...”
She descended from the platform and a lane opened before her; she
reached the door and turned.... The men of Gibeon were behind her,
and as if they were a company marching behind its commander they
followed her down the stairs. There was no shouting, no confusion,
no unsightly mob spirit.... Along the street stood waiting cars, the
cars of the farmers of the town, and men crowded into them beyond
their capacity.... It was a crusade, the crusade of Gibeon, and
Carmel had preached it.
They started quietly, grimly, an orderly procession. It moved through
the streets, across the bridge, and out the road toward the Lakeside
Hotel.... A hundred men bent upon purging their community of a
thing which had debauched it.... On and on, urgent, inexorable,
moved the line of cars.... Then a sudden stop. The road was
barricaded, and men with rifles stood behind to block the way.
“What’s this here?” bellowed a voice out of the darkness. “What kind
of goin’s on is this here?” It was Sheriff Jenney.
There was no answer. “I order ye to disperse and git to your homes
quietly,” he said. “We hain’t goin’ to have no mobbin’ in Gibeon.”
The cars emptied and men crowded forward. “Out of the way,
Jenney,” a voice commanded. “We’re in no humor to be meddled
with to-night.”
“Don’t go resistin’ an officer,” Jenney roared. “Disperse like I told ye.”
Then Jared Whitefield forced his way to the front, and on either side
of him were strangers to Gibeon. They leaped the barricade before
Jenney, taken by surprise, could move his hand. Whitefield dropped
a heavy hand on Jenney’s shoulder.
“Jenney,” he said, “drop that gun. You’re under arrest.”
“Arrest!... Me? Who kin arrest the sheriff of a county.” He laughed
loudly.
“I can,” said Whitefield. “Drop that gun.”
Jenney twisted in Whitefield’s grip, but the huge man held him as in
a vise.
“You’ve gone ag’in’ somethin’ bigger than a township or a county,
Jenney, or even a state.... It’s the United States of America that’s
puttin’ you under arrest, Jenney, through me, its duly appointed
marshal.... Drop that gun!”
The United States of America! The Federal authorities had taken a
hand. That explained Whitefield’s absence.... The United States!...
Carmel sobbed. In this thing she had the might of America behind
her! The authority of a nation!
“Put him in a car,” Whitefield directed his companions; and it was
done.
“Whitefield,” called a voice, “you hain’t goin’ to interfere? You hain’t
goin’ to stop us?”
“I got nothin’ to do with you,” Whitefield said. “I got what I come for.”
The cars filled again, the obstruction was removed, and once again
the men of Gibeon moved toward their objective. They reached it,
surrounded it, men burst in its doors and laid hands upon whomever
they found.... Carmel, well escorted, ran up the stairs.
“That’s the door,” she cried, and powerful shoulders thrust it from its
hinges.
“Evan!...” she cried. “Evan!...”
He lay upon the floor, motionless. Carmel knelt beside him, frantic at
the sight of his motionlessness. She lifted his head to her lap, peered
into his white face, stared at his closed eyes.
“They’ve killed him,” she said, in a dull, dead voice. “We’ve come too
late.”
Mr. Hopper, of the Gibeon bank, thrust his hand inside Evan’s shirt to
feel for the beating of his heart.... It was distinguishable, faint but
distinguishable.
“He’s not dead,” said Hopper, “but somebody’s beat hell out of him.”
They lifted him gently and carried him down the stairs. Carmel
walked by his side, silent, stunned.... He was not dead, but he was
horribly injured. He would die.... She knew she would never again
see his eyes looking into hers. They placed him in a car, and she sat,
supporting his weight, her arm about him, his head heavy upon her
breast....
“Everybody out?” roared a voice.
“Everybody’s out!”
Carmel saw a light appear inside the hotel, a light cast by no lamp or
lantern.... It increased, leaped, flamed. Room after room was
touched by the illumination. It climbed the stairs, roared outward
through windows, spreading, crackling, hissing, devouring.... In a
dozen minutes the Lakeside Hotel was wrapped in flame—a beacon
light in Gibeon’s history. High and higher mounted the flames until
the countryside for miles about was lighted by it, notified by it that a
thing was happening, that Gibeon was being purified by fire.
“Is there no doctor here?” Carmel cried.
“Doc Stewart’s some’eres.... I’ll git him.”
The doctor was found and came. He examined Evan as best he
could. “Better get him to town. Can’t tell much now.... Depends on
whether there’s concussion.... I’ll go along with you.”
“Before you go, Miss Lee—where—is the sheriff? Sheriff Churchill?”
“Follow the shore—that way. You’ll find him—on the edge.”
“We got Peewee Bangs—he was hidin’ in a boat-house.”
“I—I’m glad,” said Carmel.
The car moved away, bearing Carmel, Evan, and the doctor.
Somehow it seemed like the end of the world to her—a definite
stopping place of things. The lurid flames making a ghastly forest,
black figures flitting about from shadow to shadow, the confusion of
her thoughts, the piling up for days of event upon event and emotion
upon emotion—all this seemed to be a climax—a finality. There was
an unreality about it all, an unnatural crowding of events, a hustling
and jostling, as if she were in an overwrought throng of occurrences,
adventures, events, crises which pushed and shoved and harried
her, striving ever to thrust her out of their way that they might march
unimpeded. There rested upon her now a curious listlessness, a
lifelessness, as if they had succeeded, as if they had elbowed her off
the road of life, upon which she could never regain a footing.
Gibeon was aroused; Gibeon was crusading! The thought awakened
no thrill. She was safe; never again would she be threatened by the
forces which she had challenged. She was free to pursue her way—
but the knowledge came as dead knowledge. She did not care. She
cared for nothing—because she knew, she was positive, Evan Pell
had gone from her forever....
The car stopped before the doctor’s house and Evan was carried up
to a bedroom, unconscious still.... Doctor Stewart tried to exclude her
from the room, but she would not be excluded. This was all she had
left; all life held for her—that faint, irregular beating of Evan Pell’s
heart.... She knew those heartbeats were her own, would be her own
so long as they persisted.... She would remain would sit by him
watching, watching, waiting. This scarcely perceptible life was all she
would ever have of him, and she dared lose no instant of it.
Doctor Stewart worked over the bed. Carmel thought him calm,
terribly indifferent, businesslike. He was a tradesman working at a
trade when she would have had him a god performing a miracle....
After a time he turned to her.
“I cannot tell,” he said. “Some concussion is present. There seems to
be no fracture of the skull.... What internal injuries he may have
suffered—it is impossible to say.... In the morning....”
“He will be dead,” said Carmel.
The doctor shook his head. “I do not think so. I hope—in such cases
one cannot be sure—but——”
“He will be dead,” said Carmel.
“It is in God’s hand,” said the doctor.
“They have killed him—because he was brave, because he loved me
—because—— Oh, Doctor, that is the awful thought—he is dead for
me. He gave his life for me.”
His hand rested upon her shoulder with the gentle touch which some
men learn by a life of service—and Doctor Stewart, country
physician, unrecognized, unsung, had lived such a life. “My dear,” he
said, “how better could a man die?”
“He killed him—Abner Fownes killed him.”
“Abner Fownes has run his course,” said the doctor.
“It is not enough—not enough. The law can do nothing to him which
will make him pay.”
“The punishment of the law,” said the doctor, “is a puny thing beside
the punishment of God.”
Carmel stood up; she bent over the bed and kissed Evan upon the
cold lips.... Something possessed her, controlled her, a power
stronger than herself, an impulse more urgent than she had ever
known. It moved her as if she were an automaton, a puppet ordered
and regulated by strings in the hands of its fabricator. She moved
toward the door.
“Where are you going?” asked the doctor.
“I have a thing to do,” she said.
He peered into her face and saw there that which shocked him,
startled him. He would have stayed her. “Wait——” he commanded.
She eluded his outstretched hand and hurried down the stairs. There
was no indecision in her step or in her manner. There was no
indecision in her soul. She knew where she was going, and why she
was going.... She was on her way to find Abner Fownes!
CHAPTER XXVII
ABNER FOWNES was sitting in his library waiting for word from
Sheriff Jenney. If matters went to-night as he felt certain they must
go, he could live again in security, untroubled by conscience, with no
apprehensions, and with his financial worries removed. Five
truckloads of liquor had been discharged at the Lakeside Hotel. He
knew that. The importation had been successful, without a hitch.
Within a week the whisky would be distributed and the cash in
hand.... It would be sufficient to clear his most troublesome
obligations and to put him on his feet again. He considered this with
a glow of satisfaction....
Carmel Lee had constituted a threat, but she was powerless to
threaten now. At any moment word would arrive that she was in
Jenney’s hands, her reputation in Gibeon would be destroyed, and
she would be powerless. Public opinion would drive her from the
place.
Abner sat back comfortably in his chair and looked forward to a life
of quiet and importance. He would continue to live in security as
Gibeon’s first citizen. He might even seek political preferment. In a
year there would be a senatorial election. Why should he not stand
for the position. To be Senator from his state—that was something,
indeed. And why not? His reflections carried him to Washington. He
saw himself in the Senate Chamber, listened to his voice rolling forth
sonorous periods, heard with infinite satisfaction the applause of his
fellow Senators....
The telephone rang and he was guilty of unseemly haste to reach
the instrument.
“Hello!... Hello!... Who is it? Is it Jenney?”
“No,” said a voice, “it’s Deputy Jackson.... Look out for yourself....
There’s hell——”
“What’s that?”
“The whole town meetin’s rushin’ off to Peewee’s place. Reg’lar
mob.... Jenney he set out to stop ’em, but he’s arrested.”
“Jenney arrested!”
“Federal authorities. Him and two others is pinched. Better look out
for yourself. I’m goin’ to.”
The receiver banged on its hook at the other end of the line. He was
alone. Washington vanished, glowing dreams of the future gave
place to the grim reality of the present. The Federal authorities!... He
had considered them negligible. Somehow one lost sight of the
Federal government in that remote region; they were unfamiliar; it
seemed a spot to which their writ did not run.
He tried to consider the fact coolly and calmly, but his brain refused
to function in such a manner. He was confused; the suddenness, the
unexpectedness of the blow from such a source shook him from his
foundations. What did it mean? How had it come about.... Clearly, if
Jenney was under arrest, he could not complete his raid on the
Lakeside Hotel and so abolish Carmel Lee.... That was that.... But
how did it affect him? How did it affect the thousands of dollars’
worth of liquor so necessary to his financial rehabilitation?...
The big question—was he threatened personally?—was one he
could not answer. There had been no sign of threat. Jenney was
arrested. Perhaps they did not mean to arrest him, had no evidence
against him.... But could Jenney be depended upon to keep his
mouth shut?... Jenney, he confessed to himself, did not seem a man
capable of great loyalty, nor possessed of high courage. He would
weaken. Under pressure he would tell all he knew.... The advice of
the voice over the telephone was good. He would look out for
himself....
He rushed up the stairs to make ready for flight. It would be a good
idea to absent himself, no matter what happened. If worst came to
worst—why, he would be out of reach of the law. If matters turned
out otherwise it would be easy to return from a hurried business
trip.... He began packing frantically. Having packed, he went to the
safe in his library and transferred sufficient funds to his pocketbook.
Then, as a precautionary measure, he carefully destroyed certain
private papers.... This consumed time.
The telephone rang again, and Abner answered in no little
trepidation.
“Mr. Fownes?” asked a voice.
“Yes. Who is it?”
“Tucker.... Say, the mob’s burned Lakeside Hotel. They’ve got
Peewee.... Burned her up slick and clean—and everythin’ in it. The
whole shipment’s gone....”
Fownes dropped the receiver and sank nerveless into a chair. At any
rate, he was ruined. That much was certain. Nothing remained to
fight for now but his personal security, his liberty. He snatched up his
bag and moved toward the door.... His plan was not clear—only the
first step of it. He would rent an automobile and drive out of town
with what speed was possible.... As he reached the door he realized
with a sudden sharp pang that he was leaving his house for good,
leaving Gibeon forever. He, Abner Fownes, first citizen, man of
substance, was fleeing from his native place like the commonest
criminal.
Dazedly he wondered how it had come about ... somehow, he felt,
that girl was at the bottom of the thing. His misfortunes were due to
her meddling. He wished he could get his fingers upon her throat.
He descended the steps and walked toward the street. The night
was dark, dark enough to conceal his movements, perhaps to avert
recognition.... A certain confidence came to him. He would get away;
he would possess liberty and his intelligence which had served him
so well.... There were other places—and he was not old. Perhaps....
As he turned out upon the street a figure confronted him. He halted,
drew back.
“Abner Fownes,” said a voice, “where are you going?”
“You!... You!...” he said, hoarsely. His fingers twitched, fury burned in
his heart, and the desire to slay. He looked about him. All was
blackness.... Here she was, this girl who was sending him crashing
down in ruin....
“He is dead,” said Carmel. “You are a murderer again. Abner
Fownes.... You’re running away.”
“Out of my way, you—you——”
“You’ve killed him,” she said. “You must be punished for that.... You
must not go away. You must wait until they come.”
“You—you’ve done this—you——” He was working himself into a
rage. He was not the man to do a violence in cold blood.
“I have done it.... But to what good? He is dead—is dying.... Nothing
can pay for that. He will go away from me forever.... Abner Fownes,
you are a murderer, and you must pay for it.... Oh, if I could make
you pay a thousand, thousand times.... And you shall pay!”
He dropped his bag and reached for her throat with clutching fingers.
She stepped back, avoiding him.
“They are coming now,” she said. “See.... There are their lights....
Wait, Abner Fownes. You cannot get away. If you try to go I shall
hold you.”
He turned. Up the road approached a multitude of automobile lights.
Gibeon was returning from its crusade!... He uttered a shrill,
unnatural cry and made as if to rush past her, but Carmel grasped
his arm. “Wait,” she said.
He waited. A feeling of powerlessness swept over him. A sense of
impotence and defeat and despair.... He could not force himself to
raise his hand against this girl. He was afraid. He was afraid of her.
She remained standing in the middle of the walk, blocking his way,
but it was unnecessary to block his way. He could not have moved....
A cold, clinging dread was upon him. He was afraid of the night, of
the darkness. He dared not be alone with the night.... If Carmel had
gone Abner Fownes would have followed her, would have called her
back, begged her to stay with him....
The lights of the first car rested upon them, illuminating the spot....
Carmel stepped forward and signaled. The car stopped, halting the
procession.... Men got down and surrounded him....
“Where,” said Carmel, “is Sheriff Churchill?”
“There,” said a man.
“Carry him here,” she ordered, and it was done.
Wrapped in blankets, the thing that had been Sheriff Churchill was
laid on the sidewalk at Abner Fownes’s feet.
“Uncover his face. Let this man look at him,” Carmel said. “Make him
look.... Make him look....”
Fownes covered his face, staggered back. “No.... No.... Take—take it
away.”
“Uncover his face,” said Carmel. “Take this man’s hands from his
eyes.... Make him look....”
They obeyed. Fownes stood quivering, eyes tightly shut.
“Look,” said Carmel. “Look!”
She overmastered him. He opened his eyes and looked at the
dreadful sight. He stared, bent forward. His hands stretched out,
clawlike, as he stared at the horror. Then he threw back his head
and laughed, and the laughter ended in a shriek.... He swayed, half
turned, and fell back into the arms of the men of Gibeon....
Jared Whitefield forced his way to Fownes’s side. “I will take charge
of him,” he said. “Will some one take care of this girl.... She hain’t
herself.... Take her back to Doc Stewart’s....”